Description
A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.
Published: 2026-04-02
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote memory corruption via out‑of‑bounds write that can lead to code execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from an out‑of‑bounds write in LibRaw’s JPEG DHT parser, specifically within the HuffTable::initval function. By manipulating the bits array, an attacker can corrupt memory when LibRaw processes a JPEG file, potentially enabling arbitrary code execution. The weakness is classified as a buffer overflow and improper size calculation, which could compromise confidentiality or integrity.

Affected Systems

The flaw affects the LibRaw image processing library up to version 0.22.0, including all builds that ship with the vulnerable losslessjpeg.cpp parser. The vendor provides a fix in version 0.22.1. Any application that incorporates this legacy library and processes JPEG images from untrusted sources is potentially impacted.

Risk and Exploitability

The CVSS score of 5.3 reflects a moderate risk level, and the vulnerability can be triggered remotely via crafted input. No publicly listed exploitation statistics are available, but the existence of a publicly exposed proof‑of‑concept indicates the attack is plausible. The vulnerability is not currently listed in CISA’s KEV catalog, meaning it has not yet been seen widely exploited in the wild, yet the available exploit code suggests a realistic threat.

Generated by OpenCVE AI on April 2, 2026 at 04:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LibRaw to version 0.22.1 or later
  • Verify that all components linked against the upgraded library
  • Audit image‑handling code to exclude any legacy library usage
  • If upgrade is delayed, run LibRaw in a sandboxed or isolated process to limit damage
  • Monitor system logs for anomalous crashes or memory corruption events

Generated by OpenCVE AI on April 2, 2026 at 04:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
References

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 02 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.
Title LibRaw JPEG DHT losslessjpeg.cpp initval out-of-bounds write
First Time appeared Libraw
Libraw libraw
Weaknesses CWE-119
CWE-787
CPEs cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*
Vendors & Products Libraw
Libraw libraw
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T11:26:57.754Z

Reserved: 2026-04-01T12:43:19.844Z

Link: CVE-2026-5318

cve-icon Vulnrichment

Updated: 2026-04-03T19:48:54.987Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T03:16:07.080

Modified: 2026-04-29T21:53:04.877

Link: CVE-2026-5318

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-02T01:45:12Z

Links: CVE-2026-5318 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:15:48Z

Weaknesses